Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
Ivanti has recently disclosed two high-severity zero-day vulnerabilities affecting its Connect Secure and Policy Secure gateway products that are reportedly being exploited.
CVE-2023-46805 – This vulnerability allows authentication bypass on Ivanti Connect Secure VPN gateways via a malicious HTTP request. Threat actors can leverage this to access internal systems without credentials.
CVE-2024-21887 – A command injection flaw that enables unauthenticated remote code execution on Ivanti Policy Secure gateways. This allows a complete takeover of the server.
These vulnerabilities were uncovered by researchers at cybersecurity firm Volexity who observed active exploitation in attacks attributed to the Deep Panda hacking group. The attacks have been targeting government, military and financial organisations globally since at least January 2023.
Successful exploitation of these zero-day flaws could have severe impacts including:
Ivanti has released security updates to address the vulnerabilities in impacted products:
Additionally, Ivanti advises customers to take these proactive security measures:
By taking swift action to patch vulnerabilities and adopting a proactive security posture, organisations can protect themselves against threats targeting the latest zero-day exploits. This case highlights the growing sophistication of cyber-attacks and the importance of coordinated disclosure and response when critical flaws are uncovered.